Sciweavers

221 search results - page 35 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
VISUALIZATION
1991
IEEE
13 years 12 months ago
A Scientific Visualization Synthesizer
or vectors at every mesh point may lead to a very cluttered image. Continuous coloring or data mapping, on the other hand, provide a smooth representation of the data. The use of t...
Roger Crawfis, M. J. Allison
ICPR
2006
IEEE
14 years 9 months ago
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel...
Pranab Mohanty, Rangachar Kasturi, Sudeep Sarkar
USENIX
1993
13 years 9 months ago
Essence: A Resource Discovery System Based on Semantic File Indexing
Discovering different types of file resources (such as documentation, programs, and images) in the vast amount of data contained within network file systems is useful for both u...
Darren R. Hardy, Michael F. Schwartz
ICCV
1999
IEEE
14 years 10 months ago
United Snakes
Since their debut in 1987, snakes (active contour models) have become a standard image analysis technique with several variants now in common use. We present a framework called ``...
Jianming Liang, Tim McInerney, Demetri Terzopoulos
ICCV
2009
IEEE
15 years 1 months ago
Which Faces to Tag: Adding Prior Constraints into Active Learning
We introduce an algorithm that guides the user to tag faces in the best possible order during a face recognition assisted tagging scenario. In particular, we extend the active l...
Ashish Kapoor, Gang Hua, Amir Akbarzadeh and Simon...